Configuration options for an iBase system
There are various ways of configuring the iBase system. The differences between theses configurations are illustrated below.
There are two ways of holding security information:
- In a security file (in Microsoft Access format).
- In an SQL Server database, to which you connect at logon time by using a security connection file. The connection file contains only enough information to allow users access to the security database on the server.
There are also two ways of holding the user and administrative data for the database:
- In an Microsoft Access database file.
- In an SQL Server database that is opened by using a connection file. The connection file contains only enough information to allow users access to the main database on the server.
Note: The name for the database(s) on the server
match, or partially match, the name chosen for the connection file, subject to naming conventions on
the server.
This means that there are various ways of configuring the iBase system. The
following sections illustrate the differences between these configurations.